Latest CVE Feed
-
8.2
HIGHCVE-2022-31807
A vulnerability has been identified in SiPass integrated AC5102 (ACC-G2) (All versions), SiPass integrated ACC-AP (All versions). Affected devices do not properly check the integrity of firmware updates. This could allow a local attacker to upload a malic... Read more
- Published: May. 23, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Misconfiguration
-
8.7
HIGHCVE-2022-31812
A vulnerability has been identified in SiPass integrated (All versions < V2.95.3.18). Affected server applications contain an out of bounds read past the end of an allocated buffer while checking the integrity of incoming packets. This could allow an unau... Read more
Affected Products : sipass_integrated- Published: May. 23, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Denial of Service
-
9.8
CRITICALCVE-2025-6124
A vulnerability was found in code-projects Restaurant Order System 1.0 and classified as critical. This issue affects some unknown processing of the file /tablelow.php. The manipulation of the argument ID leads to sql injection. The attack may be initiate... Read more
- Published: Jun. 16, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Injection
-
4.7
MEDIUMCVE-2025-5054
Race condition in Canonical apport up to and including 2.32.0 allows a local attacker to leak sensitive information via PID-reuse by leveraging namespaces. When handling a crash, the function `_check_global_pid_and_forward`, which detects if the crash... Read more
- Published: May. 30, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Race Condition
-
3.0
LOWCVE-2021-25743
kubectl does not neutralize escape, meta or control sequences contained in the raw data it outputs to a terminal. This includes but is not limited to the unstructured string fields in objects such as Events.... Read more
Affected Products : kubernetes- EPSS Score: %0.31
- Published: Jan. 07, 2022
- Modified: Aug. 22, 2025
-
6.5
MEDIUMCVE-2025-49575
Citizen is a MediaWiki skin that makes extensions part of the cohesive experience. Multiple system messages are inserted into the CommandPaletteFooter as raw HTML, allowing anybody who can edit those messages to insert arbitrary HTML into the DOM. This im... Read more
Affected Products : citizen- Published: Jun. 12, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Misconfiguration
-
6.5
MEDIUMCVE-2025-49576
Citizen is a MediaWiki skin that makes extensions part of the cohesive experience. The citizen-search-noresults-title and citizen-search-noresults-desc system messages are inserted into raw HTML, allowing anybody who can edit those messages to insert arbi... Read more
Affected Products : citizen- Published: Jun. 12, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Cross-Site Scripting
-
6.5
MEDIUMCVE-2025-49577
Citizen is a MediaWiki skin that makes extensions part of the cohesive experience. Various preferences messages are inserted into raw HTML, allowing anybody who can edit those messages to insert arbitrary HTML into the DOM. This vulnerability is fixed in ... Read more
Affected Products : citizen- Published: Jun. 12, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Cross-Site Scripting
-
6.5
MEDIUMCVE-2025-49578
Citizen is a MediaWiki skin that makes extensions part of the cohesive experience. Various date messages returned by `Language::userDate` are inserted into raw HTML, allowing anybody who can edit those messages to insert arbitrary HTML into the DOM. This ... Read more
Affected Products : citizen- Published: Jun. 12, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Cross-Site Scripting
-
6.5
MEDIUMCVE-2025-49579
Citizen is a MediaWiki skin that makes extensions part of the cohesive experience. All system messages in menu headings using the Menu.mustache template are inserted as raw HTML, allowing anybody who can edit those messages to insert arbitrary HTML into t... Read more
Affected Products : citizen- Published: Jun. 12, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Cross-Site Scripting
-
9.8
CRITICALCVE-2025-36041
IBM MQ Operator LTS 2.0.0 through 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 through 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1 through 3.5.3, and MQ Operator SC2 3.2.0 through 3.2.12 Native HA CRR could be configured with a private key and chain other than... Read more
- Published: Jun. 15, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Misconfiguration
-
5.3
MEDIUMCVE-2025-52576
Kanboard is project management software that focuses on the Kanban methodology. Prior to version 1.2.46, Kanboard is vulnerable to username enumeration and IP spoofing-based brute-force protection bypass. By analyzing login behavior and abusing trusted HT... Read more
Affected Products : kanboard- Published: Jun. 25, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Authentication
-
6.5
MEDIUMCVE-2025-55637
Reolink Smart 2K+ Plug-in Wi-Fi Video Doorbell with Chime - firmware v3.0.0.4662_2503122283 was discovered to contain a command injection vulnerability via the setddns_pip_system() function.... Read more
Affected Products :- Published: Aug. 22, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Injection
-
7.5
HIGHCVE-2025-55634
Incorrect access control in the RTMP server settings of Reolink Smart 2K+ Plug-in Wi-Fi Video Doorbell with Chime - firmware v3.0.0.4662_2503122283 allows unauthorized attackers to cause a Denial of Service (DoS) via initiating a large number of simultane... Read more
Affected Products :- Published: Aug. 22, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2025-55631
Reolink Smart 2K+ Plug-in Wi-Fi Video Doorbell with Chime - firmware v3.0.0.4662_2503122283 was discovered to manage users' sessions system wide instead of an account-by-account basis, potentially leading to a Denial of Service (DoS) via resource exhausti... Read more
Affected Products :- Published: Aug. 22, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Denial of Service
-
7.3
HIGHCVE-2025-55630
A discrepancy in the error message returned by the login function of Reolink Smart 2K+ Plug-in Wi-Fi Video Doorbell with Chime - firmware v3.0.0.4662_2503122283 when entering the wrong username and password allows attackers to enumerate existing accounts.... Read more
Affected Products :- Published: Aug. 22, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Information Disclosure
-
6.5
MEDIUMCVE-2025-55629
Insecure permissions in Reolink Smart 2K+ Plug-in Wi-Fi Video Doorbell with Chime - firmware v3.0.0.4662_2503122283 allow attackers to arbitrarily change other users' passwords via manipulation of the userName value.... Read more
Affected Products :- Published: Aug. 22, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Authentication
-
5.3
MEDIUMCVE-2025-55627
Insufficient privilege verification in Reolink Smart 2K+ Plug-in Wi-Fi Video Doorbell with Chime - firmware v3.0.0.4662_2503122283 allows authenticated attackers to create accounts with elevated privileges.... Read more
Affected Products :- Published: Aug. 22, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2025-51825
JeecgBoot versions from 3.4.3 up to 3.8.0 were found to contain a SQL injection vulnerability in the /jeecg-boot/online/cgreport/head/parseSql endpoint, which allows bypassing SQL blacklist restrictions.... Read more
Affected Products :- Published: Aug. 22, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Injection
-
5.3
MEDIUMCVE-2025-50691
MCSManager 10.5.3 daemon process runs as a root account by default, and its sensitive data (including tokens and terminal content) is stored in the data directory, readable by all users. Other users on the system can read the daemon's key and use it to lo... Read more
Affected Products :- Published: Aug. 22, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Misconfiguration